Zorum 3.5 allows remote attackers to obtain the full installation path via direct requests to (1) gorum/notification.php, (2) user.php, (3) attach.php, (4) blacklist.php, (5) zorum/forum.php, (6) globalstat.php, (7) gorum/trace.php, (8) gorum/badwords.php, or (9) gorum/flood.php.
References
Link | Resource |
---|---|
http://rgod.altervista.org/zorum.html | Exploit Vendor Advisory |
http://securitytracker.com/id?1014725 | Exploit Vendor Advisory |
http://marc.info/?l=bugtraq&m=112438781604862&w=2 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/21914 |
Configurations
Information
Published : 2005-08-22 21:00
Updated : 2017-07-10 18:32
NVD link : CVE-2005-2652
Mitre link : CVE-2005-2652
JSON object : View
CWE
Products Affected
phpoutsourcing
- zorum